General

  • Target

    JaffaCakes118_07635e09b07f448dae84a64557fbd6214ae2be52391ab67257fe53fb42fbb808

  • Size

    198KB

  • Sample

    241223-rly68asjcj

  • MD5

    3ec8e58a92565c4ced1145c1c72ab6ec

  • SHA1

    a34a09a7adc735bf169b9ec84d11f64f68132270

  • SHA256

    07635e09b07f448dae84a64557fbd6214ae2be52391ab67257fe53fb42fbb808

  • SHA512

    b8fab3c46dc352f6bc1e25d1df6a50620e3b6e212b4f2e7540fd2fd343420d83ba059e6e10ff7b419273254fe6a44e72226bf1a3c4fd9209ad768857e6f32e41

  • SSDEEP

    3072:NnrGi1mhhahmGJlLRwdSFK5KircPI1ZeNMkcx8EuSzsz:NrGi1mhZGJFGq0cPI1siuSz+

Malware Config

Extracted

Family

tofsee

C2

defeatwax.ru

refabyd.info

Targets

    • Target

      JaffaCakes118_07635e09b07f448dae84a64557fbd6214ae2be52391ab67257fe53fb42fbb808

    • Size

      198KB

    • MD5

      3ec8e58a92565c4ced1145c1c72ab6ec

    • SHA1

      a34a09a7adc735bf169b9ec84d11f64f68132270

    • SHA256

      07635e09b07f448dae84a64557fbd6214ae2be52391ab67257fe53fb42fbb808

    • SHA512

      b8fab3c46dc352f6bc1e25d1df6a50620e3b6e212b4f2e7540fd2fd343420d83ba059e6e10ff7b419273254fe6a44e72226bf1a3c4fd9209ad768857e6f32e41

    • SSDEEP

      3072:NnrGi1mhhahmGJlLRwdSFK5KircPI1ZeNMkcx8EuSzsz:NrGi1mhZGJFGq0cPI1siuSz+

    • Tofsee

      Backdoor/botnet which carries out malicious activities based on commands from a C2 server.

    • Tofsee family

    • Windows security bypass

    • Creates new service(s)

    • Modifies Windows Firewall

    • Sets service image path in registry

    • Checks computer location settings

      Looks up country code configured in the registry, likely geofence.

    • Deletes itself

    • Executes dropped EXE

    • Suspicious use of SetThreadContext

MITRE ATT&CK Enterprise v15

Tasks